Configure AAA Authorization for Roles
Authorization services determine if the user has permission to use a command in the CLI. Users with only privilege levels can use
commands in privilege-or-role mode (the default) provided their privilege level is the same or greater than the privilege level of those
commands. Users with defined roles can use commands provided their role is permitted to use those commands. Role inheritance is also
used to determine authorization.
Users with roles and privileges are authorized with the same mechanism. There are six methods available for authorization:
radius
,
,
local
,
enable
,
line
, and
none
.
When role-based only AAA authorization is enabled, the
enable
,
line
, and
none
methods are not available. Each of these three
methods allows users to be authorized with either a password that is not specific to their userid or with no password at all. Because of the
lack of security, these methods are not available for role-based only mode.
To configure AAA authorization, use the
aaa authorization exec
command in CONFIGURATION mode. The
aaa
authorization exec
command determines which CLI mode the user will start in for their session; for example, Exec mode or Exec
Privilege mode. For information about how to configure authentication for roles, see
Configure AAA Authentication for Roles.
aaa authorization exec {
method-list-name
| default}
method
[…
method4
]
You can further restrict users’ permissions, using the
aaa authorization command
command in CONFIGURATION mode.
aaa authorization command {
method-list-name
| default}
method
[…
method4
]
Examples of Applying a Method List
The following configuration example applies a method list: , RADIUS and local:
!
radius-server host 10.16.150.203 key <clear-text>
!
tacacs-server host 10.16.150.203 key <clear-text>
!
aaa authentication login ucraaa radius local
aaa authorization exec ucraaa radius local
aaa accounting commands role netadmin ucraaa start-stop
!
The following configuration example applies a method list other than default to each VTY line.
NOTE:
Note that the methods were not applied to the console so the default methods (if configured) are applied there.
!
line console 0
exec-timeout 0 0
line vty 0
login authentication ucraaa
authorization exec ucraaa
accounting commands role netadmin ucraaa
line vty 1
login authentication ucraaa
authorization exec ucraaa
accounting commands role netadmin ucraaa
line vty 2
login authentication ucraaa
authorization exec ucraaa
accounting commands role netadmin ucraaa
line vty 3
login authentication ucraaa
authorization exec ucraaa
accounting commands role netadmin ucraaa
line vty 4
732
Security
Содержание S3048-ON
Страница 1: ...Dell Configuration Guide for the S3048 ON System 9 11 2 5 ...
Страница 137: ...0 Gi 1 1 Gi 1 2 rx Flow N A N A 0 0 No N A N A yes Access Control Lists ACLs 137 ...
Страница 142: ...Figure 10 BFD Three Way Handshake State Changes 142 Bidirectional Forwarding Detection BFD ...
Страница 241: ...Dell Control Plane Policing CoPP 241 ...
Страница 287: ... RPM Synchronization GARP VLAN Registration Protocol GVRP 287 ...
Страница 428: ...Figure 53 Inspecting the LAG Configuration 428 Link Aggregation Control Protocol LACP ...
Страница 429: ...Figure 54 Inspecting Configuration of LAG 10 on ALPHA Link Aggregation Control Protocol LACP 429 ...
Страница 432: ...Figure 56 Inspecting a LAG Port on BRAVO Using the show interface Command 432 Link Aggregation Control Protocol LACP ...
Страница 433: ...Figure 57 Inspecting LAG 10 Using the show interfaces port channel Command Link Aggregation Control Protocol LACP 433 ...
Страница 477: ...Figure 73 Configuring Interfaces for MSDP Multicast Source Discovery Protocol MSDP 477 ...
Страница 478: ...Figure 74 Configuring OSPF and BGP for MSDP 478 Multicast Source Discovery Protocol MSDP ...
Страница 479: ...Figure 75 Configuring PIM in Multiple Routing Domains Multicast Source Discovery Protocol MSDP 479 ...
Страница 483: ...Figure 77 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 483 ...
Страница 484: ...Figure 78 MSDP Default Peer Scenario 3 484 Multicast Source Discovery Protocol MSDP ...
Страница 634: ...protocol spanning tree pvst no disable vlan 300 bridge priority 4096 634 Per VLAN Spanning Tree Plus PVST ...
Страница 745: ...Figure 104 Single and Double Tag TPID Match Service Provider Bridging 745 ...
Страница 746: ...Figure 105 Single and Double Tag First byte TPID Match 746 Service Provider Bridging ...